共 50 条
- [31] Annotation-based Access Control Approach for Ubiquitous Systems 2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 218 - 225
- [32] A Trust and Context Based Access Control Model for Distributed Systems HPCC 2008: 10TH IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2008, : 629 - +
- [34] Policy storage for role-based access control systems TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2003, : 196 - 201
- [35] Access control based on code identity for open distributed systems TRUSTWORTHY GLOBAL COMPUTING, 2008, 4912 : 169 - +
- [36] Resource and Role Hierarchy Based Access Control for Resourceful Systems 2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2018), VOL 2, 2018, : 480 - 486
- [37] Role-based access control model for CSCW systems Ruan Jian Xue Bao/Journal of Software, 2000, 11 (07): : 931 - 937
- [39] Access control coherence of information systems based on security constraints COMPUTER SAFETY, RELIABILTIY, AND SECURITY, PROCEEDINGS, 2006, 4166 : 412 - 425
- [40] Deconflicting policies in attribute-based access control systems 2018 IEEE 5TH INTERNATIONAL CONGRESS ON INFORMATION SCIENCE AND TECHNOLOGY (IEEE CIST'18), 2018, : 130 - 136